Abstract
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be either a loss of trust or a willingness to tolerate increasing risk having weathered one assault. Examining human and computer interaction with a focus on evaluations, the human response to loss of trust is a key part of the search for more secure networks. The success of current efforts to design appropriate security mechanisms depends as much on an understanding of human extensions of trust to computers as it does on an understanding of underlying mathematics. However, the former has not been sufficiently examined.
In this work we survey the findings in social psychology and philosophy with respect to trust. We introduce three hypotheses that remain unanswered with respect to the manner in which humans react to computers. We discuss potential design revisions in light of findings from other disciplines. Then we conclude by noting that research which empowers users to be their own security manager may be based on a fundamentally flawed view of human-computer interaction. We close by encouraging designers of computer security systems to examine the humans, which these systems are intended to empower, and recommend that any security system be built on the basis of understanding of human trust provided by the social sciences.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R.E., Johnson, D.G., Gotterbarn, D., and Perrolle, J., 1993, “Using the ACM Code of Ethics in Decision making”, Communications of the ACM, Vol. 36, 98–107.
Abric and Kahanês, 1972, “The effects of representations and behavior in experimental games”, European Journal of Social Psychology, Vol. 2, pp. 129–144.
Axelrod, R., 1994, The Evolution of Cooperation, HarperCollins, USA.
Becker, Lawrence C. “Trust in Non-cognitive Security about Motives”, Ethics 107 (Oct. 1996): 43–61.
Blaze, M., Feigenbaum, J., and Lacy, J., 1996, “Decentralized Trust Management”, Proceedings of the IEEE Symposium on Security and Privacy, pp. 164–173.
Bloom, 1998, “Technology Experimentation, and the Quality of Survey Data”, Science, Vol. 280, pp. 847–848.
Boston Consulting Group, 1997, Summary of Market Survey Results prepared for eTRUST, The Boston Consulting Group San Francisco, CA, March.
Clark and Blumenthal, “Rethinking the design of the Internet: The end to end arguments vs. the brave new world”, Telecommunications Policy Research Conference, Washington DC, September 2000.
Coleman, J., 1990, Foundations of Social Theory, Belknap Press, Cambridge, MA.
Compaine B.J., 1988, Issues in New Information Technology, Ablex Publishing; Norwood, NJ.
Computer Science and Telecommunications Board, 1994, Rights and Responsibilities of Participants in Networked Communities, National Academy Press, Washington, D.C.
Keisler, Sproull, and Waters, 1996, “A Prisoners Dilemma Experiments on Cooperation with People and Human-Like Computers”, Journal of Personality and Social Psychology, Vol. 70, pp. 47–65.
Dawes, McTavish, and Shaklee, 1977, “Behavior, communication, and assumptions about other people’s behavior in a commons dilemma situation”, Journal of Personality and Social Psychology, Vol. 35, pp. 1–11.
B. Friedman, P.H. Kahn, Jr., and D.C. Howe, “Trust Online”, Communications of the ACM, December 2000, Vol. 43, No. 12 pp. 34–40.
Foley, 2000, “Can Micrsoft Squash 63,000 Bugs in Win2k?”, ZDnet Eweek, on-line edition, 11 February 2000, available at http://www.zdnet.com/eweek/stories/general/0,11011,2436920,00.html.
Fukuyama F., 1996, Trust: The Social Virtues and the Creation of Prosperity, Free Press, NY, NY.
Garfinkle, 1994, PGP: Pretty Good Privacy, O’Reilly and Associates, Inc., Sebastopol, CA, pp. 235–236.
Hoffman, L. and Clark P., 1991, “Imminent policy considerations in the design and management of national and international computer networks”, IEEE Communications Magazine, February, pp. 68–74.
Kerr and Kaufman-Gilliland, 1994, “Communication, Commitment and cooperation in social dilemmas”, Journal of Personality and Social Psychology, Vol. 66, pp. 513–529.
Luhmann, Niklas. “Trust: A Mechanism For the Reduction of Social Complexity”, Trust and Power: Two works by Niklas Luhmann. New York: John Wiley & Sons, 1979. pp. 1–103.
National Research Council, 1996, Cryptography’s Role in Securing the Information Society, National Academy Press, Washington, DC.
Nissenbaum, H. “Securing Trust Online: Wisdom or Oxymoron?” Forthcoming in Boston University Law Review.
Office of Technology Assessment, 1985, Electronic Surveillance and Civil Liberties, OTA-CIT-293, United States Government Printing Office; Gaithersburg, MD.
Office of Technology Assessment, 1986, Management, Security and Congressional Oversight, OTA-CIT-297, United States Government Printing Office; Gaithersburg, MD.
Seligman, Adam. The Problem of Trust. Princeton: Princeton University Press, 1997.
Slovic, Paul. “Perceived Risk, Trust, and Democracy”, Risk Analysis 13.6 (1993): 675–681.
Sproull L. and Kiesler S., 1991, Connections, The MIT Press, Cambridge, MA.
Tygar and Whitten, 1996, “WWW Electronic Commerce and Java Trojan Horses”, Proceedings of the Second USENIX Workshop on Electronic Commerce, Nov. 18–21 Oakland, CA 1996, pp. 243–249.
United States Council for International Business, 1993, Statement of the United States Council for International Business on the Key Escrow Chip, United States Council for International Business, NY, NY.
Wacker, J., 1995, “Drafting agreements for secure electronic commerce”, Proceedings of the World Wide Electronic Commerce: Law, Policy, Security, and Controls Conference, October 18–20, Washington, DC, p. 6.
Walden, I., 1995, “Are privacy requirements inhibiting electronic commerce”, Proceedings of the World Wide Electronic Commerce: Law, Policy, Security, and Controls Conference, October 18–20, Washington, DC, p. 10.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Camp, L.J., Nissenbaum, H., McGrath, C. (2002). Trust: A Collision of Paradigms. In: Syverson, P. (eds) Financial Cryptography. FC 2001. Lecture Notes in Computer Science, vol 2339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46088-8_10
Download citation
DOI: https://doi.org/10.1007/3-540-46088-8_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44079-6
Online ISBN: 978-3-540-46088-6
eBook Packages: Springer Book Archive